Risk, Issue, and Opportunity Management...
How can ServiceNow help end-users comply with the DoD’s Released Management Guide, “DoD Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs”? During this session, we discussed how customers can both mitigate risk in portfolio management, as well as adhere to the requirements of the Management Guide - all in real-time (as opposed to accessing risk during a project postmortem ass...
Why Traditional EDR is Still Not Enough...
Attendees of this webinar heard how VMware Carbon Black XDR is the new baseline for serving up the security for organizations today for operational excellence and reducing cost liabilities. With XDR, organizations have been able to experience a number of proven benefits when measured against traditional endpoint security methods, including: Unique capabilities for identifying, prioritizing, and reducing risk Complete coverage: endpoints, work...
Introduction to Feature Flag Management...
Deploying new applications and software updates is a risky operation for federal agencies that can leave developers scrambling to resolve issues. Feature flag management addresses many of the issues federal agencies face in the development cycle. It can enable greater developer productivity, speed up the development cycle and reduce the risk associated with deployments using continuous integration and continuous deployment (CI/CD) practices....
Go Beyond IAM: Implementing IGA to Miti...
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform. Register to view this on-demand recording.
Bridging Borders: How AI and Public Inf...
This webinar brought together border security and artificial intelligence (AI) experts to explore best practices for integrated border management, with a specific focus on the use of AI and publicly and commercially available information sources to detect and prevent cross-border crime. Participants learned: How AI can improve the effectiveness of border management systems in a myriad of ways, such as by increasing the accuracy of name matchin...
Mastering Identity Governance: Enhancin...
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the only FedRAMP High and DoD Impact Level 5 platform in a private tenant-managed SaaS environment that can be tailored to y...
Unraveling Digital Supply Chain Threats...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains. Some key highlights from this discussion were: The role of Software Bill of Materials (SBOMs) in mitigating vulnerabilities and ensuring supply chain integrity. Practical strategies to tackle supply chain issues head-on, based on eye-opening i...
Report Card on Risk: Managing Risk in H...
A new generation of faculty and students, technological pressures, rising costs, and emerging risks present a unique set of obstacles for higher education institutions. Watch our on-demand webinar to hear industry experts discuss the risks facing higher education executives today, how an integrated approach to risk management and technology can help manage those risks, and the advantages of leveraging one platform to power innovation and conne...
Supporting CISA BOD 23-02 with Attack S...
Check out our on-demand webinar with Censys where attendees learned: How to identify CISA BOD 23-02 Understand the risks of remotely accessible management interfaces How Censys found publicly exposed devices
An Introduction to Advanced Analytics
Watch this Alteryx hands-on-lab for an interactive session on conducting end-to-end analysis. Two Alteryx Sales Engineers, unpacked how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, attendees get hands-on and learn how to apply the techniques for themselves. Attendees learned...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.